Sciweavers

1923 search results - page 299 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
WORDS
2005
IEEE
15 years 3 months ago
Towards Self-Healing Systems via Dependable Architecture and
Self-healing systems focus on how to reducing the complexity and cost of the management of dependability policies and mechanisms without human intervention. This position paper pr...
Hong Mei, Gang Huang, Wei-Tek Tsai
VRML
1997
ACM
15 years 2 months ago
V-COLLIDE: Accelerated Collision Detection for VRML
Collision detection is essential for many applications involving simulation, behavior and animation. However, it has been regarded as a computationallydemanding task and is often ...
Thomas C. Hudson, Ming C. Lin, Jonathan D. Cohen, ...
SRDS
2006
IEEE
15 years 3 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...
TDSC
2008
152views more  TDSC 2008»
14 years 9 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
MOBIWAC
2006
ACM
15 years 3 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...